Chances are your employees, contractors or business partners could misuse your systems with criminal intent. We collected over 800 insider threat cases for the past 12 years. This session details the most intriguing cases—some present unique mitigation challenges; others had serious results and can provide lessons learned. There will also be recommendations for mitigating these threats.